June grade 12 terminology Flashcards
4G (LTE)
4G is the fourth generation of cellular wireless standard and is a successor to 3G. 4G
networks use different frequencies to transmit data and should achieve far higher speeds that
3G.
64-bit
64-bit computers have a processor that work with 64 bits at a time. This means that memory
addresses, register sizes, address and data bus sizes and instruction sizes are all 64 bits in
length. In other words the computer is able to process at most 64 bits of data at once.
Access point
Also called a base station, consists of a sender/receiver (transceiver) and an antenna which
transmits and receives radio signals so that the devices that have a wireless network card are
able to communicate with the rest of network.
Activation codes
A series of letters and digits that must be entered during software installation to authenticate
that copy of the software.
ADSL
Asymmetric digital subscriber line Digital Subscriber Line. Used by homes and businesses
for dedicated dig ital high speed connection to the internet over conventional phone lines.
Adware
Software that automatically displays or downloads advertising material such as banners or
pop- ups when a user is online.
Anomalies
Errors which occur when editing a database that has not been normalised. They include
UPDATE, INSERT and DELETE anomalies.
Anti virus software
Anti-virus software is a program or set of programs that are designed to detect, prevent and
remove software viruses, and other malicious software.
API
Application Programming Interface. The form of an API varies depending on the type of
programming language but often it is a library of programming modules which facilitate the
creation of applications which communicate with the Operating System.
Archive
To copy and compress data files to a long-term storage medium.
BitTorrent
BitTorrent is a peer-to-peer (P2P) file sharing protocol designed to reduce the bandwidth
required to transfer files. For example, if a user begins downloading a movie file, the
BitTorrent system will locate multiple computers with the same file and begin downloading
the file from several computers at once.
Artificial Intelligence
Simulation of human decision-making processes by a computer system.
Assembler
A program that translates a programmer’s code, written in Assembly Code, into executable
machine code.
BIOS
Basic Input Output System – the essential start up instructions of a computer, stored in ROM
on the motherboard.
Blockchain
A system in which a record of transactions made in bitcoin or another cryptocurrency are
maintained across several computers that are linked in a peer-to-peer network.
Asymmetric
Encryption
Cryptographic algorithms (keys) which comprise of two separate keys, one of which is secret
(or private) and one of which is public. The pair of keys are mathematically linked but one
cannot be derived from the other, i.e. if a user has the public key he cannot work out the
private key (or vice versa).
Attenuation
Attenuation is the reduction in signal strength while transmitting data. The further the signal
gets from the source the weaker it will become.
Audio and Video on
Demand (AVOD)
Video on demand (VOD) or audio and video on demand (AVOD) are systems which allow
users to select and watch/listen to video or audio content when they choose to, rather than
having to watch at a specific broadcast time.
AUP
Acceptable Usage Policy, a document that outlines the rights and responsibilities of users
within a network environment, including the consequences of violating these stipulations.
Audit trail
An audit trail (also called audit log) is a security-relevant chronological record, set of
records, and/or destination and source of records that provide documentary evidence of the
sequence of activities that have affected at any time a specific operation, procedure, or event.
Backup
A copy of data files and other relevant files stored to enable full restoration of service in the
event of data loss. There is a trend towards cloud based backup services.
Bandwidth
The total amount of data that can be transferred from one point to another in a given period
of time.
Biometrics
Security based on identification of unique physical characteristics of a person such as
fingerprints and retina.
Big Data
Big data is a combination of structured, semistructured and unstructured data collected by
organizations that can be mined for information and used in machine learning projects,
predictive modeling and other advanced analytics applications
Blog
A blog reads like a journal with the most recent entry at the top.
Botnets
Also known as a zombie army. A botnet is a group of computers which have been infected by
malware and are controlled from a server to run related software programs and scripts. Often
utilised to forward spam
HTTPS
Hypertext Transfer Protocol Secure (HTTPS) is a secure variant of HTTP that adds a layer of
security on the data in transit through a secure socket layer (SSL) whereby the entire
webpage is encrypted before transfer.
Bluetooth
A wireless technology that allows devices such as a mouse, printers and cellphones to
communicate over a relatively short distance, typically less than 10 m.
HTTP
HyperText Transfer Protocol is an application-layer protocol used to transmit Hypertext on
the internet.
Control unit
The Control Unit (CU) section of the CPU directs all CPU operations. It controls the fetch
execute cycle and sequence of operations and interprets the instructions.
Cookie
A collection of information, stored in a small text file on the local computer of a person using
the World Wide Web, used chiefly by websites to identify users who have previously
registered or visited the site.
Bridge
Device that links two networks segments and can reduce network traffic.
Buffer
A ‘data buffer’ is a region of memory which is used to temporarily hold data while it waits for
some form of further processing often by a slower or busier device that cannot handle the
data immediately.
Bus
A set of electrical paths etched on a motherboard to transport data, instructions or addresses
between components on the motherboard.
Cache memory
Instructions and data are prefetched from slower RAM and placed cache in order to speed up
the CPUs processing. Cache memory is made up of SRAM chips.
Caching
The principle of using a faster device to speed up access from a slower device. For example
disk caching is where RAM is used to store blocks of data to speed up access from the slower
hard drive.
Cap
A bandwidth cap limits the total amount of data which can be downloaded over a given
period of time.
Check digit
Number added to a code (such as a bar code or account number) to verify that transmitted
data is received correctly. The check digit before transmission should remain the same on
the receipt.
Chipset
A chipset is a group of integrated circuits that work together. It is a set of chips used on a
motherboard to connect components. For example the Northbridge (connected to fast
components such as RAM) and the Southbridge (connected to slower components such as
the HDD).
Client-server
Client: A client is a computer terminal that retrieves information from or uses resources
provided by a server. Server: A powerful computer which provides services to clients on a
network.
Cloud Computing
Cloud computing is an Internet service which can provide on-line applications, store data
on-line and in a recent trend provide hardware for use on-line.
CMOS
Complementary Metal Oxide Semiconductor – A technology for producing the type of
memory that stores the various user configurable computer startup settings that can be
updated or changed.
Compiler
A program that translates an entire high level program source code into object code. The
object code is machine code which may be used to create standalone ‘executable files’.
Composite keys/
compound key
A composite key is a combination of two or more fields in a table to create a Primary Key.
Compression
Compression is the process of applying an algorithm to a file to reduce its size. Lossless
compression is where data is compressed without losing any portion of the data. It allows the
exact original data to be reconstructed. Lossy compression loses detail so that the file is not
restored to its original size.
GPU
Graphics Processing Unit – dedicated graphics processor on a graphics card, used to render
images stored in the RAM of the graphics card.
Hardware Interrupt
A signal to the CPU indicating a device needs attention. For example, a mouse click or a
keystroke.
HDMI
High-Definition Multimedia Interface for transferring high definition video and audio.
Hoaxes
An email that provides a warning about a virus, worm or some other disaster, and urges
recipients to forward the message thereby generating unnecessary traffic.
Hot-pluggable/Hotswappable
.
Hot plugging is the ability to replace or install a device without shutting down the attached
computer.
Hotspot
An area, usually in a public space such as an airport, restaurant or hotel lobby, where people
may receive and be granted WiFi access from an access point to connect wirelessly to the
Internet.
HTML
Hypertext Markup Language used to create webpages. The tags (<h1>This is a
heading</h1>) are translated by web browsers into the graphical representation shown on the
computer screen.
HTTP
HyperText Transfer Protocol is an application-layer protocol used to transmit Hypertext on
the internet
WeB LOG
Websites updated regularly with news and events in chronological order
Copyright
The exclusive legal right to reproduce, publish, sell, or distribute original work (such as
computer publications, graphics and software).
Cyber crimes
Criminal activity using computers on the Internet or any network.
Dark Web
The dark web is the part of the World Wide Web that is only accessible by means of special
software, allowing users and website operators to remain anonymous or untraceable. The
dark web forms a small part of the deep web, the part of the Web not indexed by web search
engines.
Data dependency
A data dependency in a database is where one field has a dependency or relationship with
another field. For example knowing a person’s ID number can produce their name.
Data Integrity
Data integrity refers to the overall completeness, accuracy and consistency of data.
Data mining
The use of sophisticated software to examine a large volume of information stored in many
databases on-line to discover patterns and trends. Usually aimed at transforming large
volumes of unstructured data in a form that can be used to make decisions.
Data redundancy
Data redundancy occurs in database systems where a field is repeated unnecessarily as a
result of a one-to-many or many-to-many relationship.
Data verification
Checking to ensure that captured data is a legitimate copy of inputted data. Performed when
data has been entered. For example inputting a password twice.
Data warehouse
A data warehouse is a database storing data from many sources over a period of time for
reporting and data analysis in order to make decisions.
Data structure
A data structure is a specialised format for organising and storing data in a program. General
data structure types include the array, the file, the record
Data validation
Checking that captured data is logically correct and falls within acceptable ranges for that
data. Validation is performed at the time of input.
Data verification
Checking to ensure that captured data is a legitimate copy of inputted data. Performed when
data has been entered. For example inputting a password twice.
Data warehousing
A data warehouse is a database storing data from many sources over a period of time for
reporting and data analysis in order to make decisions.
Database
management system
(DBMS)
Database Management System is software that provides database functionality to physical
users or client software that needs data. These systems are capable of storing large amounts
of structured data which can be easily queried and accessed using SQL or other similar
languages.
DDR Memory
Double Data Rate. A type of SDRAM which sends and receive signals twice per clock cycle
DDR Memory
Double Data Rate. A type of SDRAM which sends and receive signals twice per clock cycle
Defragmentation
The process of locating the non-contiguous fragments of data into which a computer file may
be divided as it is stored on a hard disk, and rearranging the fragments and restoring them
into fewer fragments or into the whole file.
Denial of service
attack (DoS)
A ‘denial-of-service’ attack is characterised by an explicit attempt by attackers to prevent
legitimate users of a service from using that service. Examples include attempts to ‘flood’ a
network, thereby preventing legitimate network traffic
Derived data
Data in the field of a database which has been created from two or more existing fields in the
database table, for example: calculating the age from the date of birth
Device driver
A device driver is a computer program that provides communication between the device and
the Operating System. A piece of software that controls a peripheral on a computer.
DHCP
The Dynamic Host Configuration Protocol is a standardised network protocol that is used by
network server to provide a unique IP address to all nodes as they join the network
Digital Divide
The digital divide refers to the difference between people who have easy access to the
Internet and IT resources and those who do not.
Digital signature
Data added to a file to authenticate its source. The Digital signature is verified by consulting
a Digital Authority organisation which keeps an original record of the signature.
Distributed
processing
Refers to a network setup where individual terminals have sufficient processing power to
complete their tasks without reference to a central powerful server (refer to Centralised
Processing).
Distributed database
A system where parts of a database (the data and the DBMS) are spread (distributed) across
servers in separate locations.
DNS (Domain Name
Service/ Server)
An Internet service that maps domain names to numerical IP addresses
Domanin name
Domain name A string that translates back to an IP address to allow access to a website.
DRAM
Dynamic RAM. A memory chip that uses capacitors and needs to be refreshed.
Duplicate data
Data that is repeated in the database for valid reasons. For example two people living in the same suburb
EEPROM
Electronically Erasable Programmable Read Only Memory – a type of ROM that can be
erased electronically, after which a new ‘image’ of the upgraded contents can be written back.
GPU
Graphics Processing Unit – dedicated graphics processor on a graphics card, used to render
images stored in the RAM of the graphics card.
Hardware interrupt
A signal to the CPU indicating a device needs attention. For example, a mouse click or a
keystroke
E-book
An electronic version of a printed book which can be read on a computer or a specifically
designed handheld device A publication/book made available in digital/electronic form.
Embedded Operating
System
A dedicated operating system installed in mobile handheld devices, appliances, equipment
and vehicles. Normally on a ROM chip.
EMI
Electro Magnetic Interference. The disruption of signal caused by proximity to an
electromagnetic field from another electronic device.
Emulation
Emulation is the process of duplicating the function of a computer system in a computer not
designed for that system, for example, running PC software on an Apple computer.
Encryption
Converting data into an unreadable form according to a specified set of rules to ensure the
privacy of data during communication, or for security purposes.